CVE-2022-49986

Source
https://cve.org/CVERecord?id=CVE-2022-49986
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49986.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49986
Downstream
Related
Published
2025-06-18T11:00:47.985Z
Modified
2026-03-12T03:26:03.230792Z
Summary
scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Remove WQMEMRECLAIM from storvscerrorwq

storvscerrorwq workqueue should not be marked as WQMEMRECLAIM as it doesn't need to make forward progress under memory pressure. Marking this workqueue as WQMEMRECLAIM may cause deadlock while flushing a non-WQMEMRECLAIM workqueue. In the current state it causes the following warning:

[ 14.506347] ------------[ cut here ]------------ [ 14.506354] workqueue: WQMEMRECLAIM storvscerrorwq0:storvscremovelun is flushing !WQMEMRECLAIM eventsfreezablepower:diskeventsworkfn [ 14.506360] WARNING: CPU: 0 PID: 8 at <-snip->kernel/workqueue.c:2623 checkflushdependency+0xb5/0x130 [ 14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu [ 14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 [ 14.506393] Workqueue: storvscerrorwq0 storvscremovelun [ 14.506395] RIP: 0010:checkflush_dependency+0xb5/0x130 <-snip-> [ 14.506408] Call Trace: [ 14.506412] __flush_work+0xf1/0x1c0 [ 14.506414] __cancelworktimer+0x12f/0x1b0 [ 14.506417] ? kernfsput+0xf0/0x190 [ 14.506418] canceldelayedworksync+0x13/0x20 [ 14.506420] diskblockevents+0x78/0x80 [ 14.506421] delgendisk+0x3d/0x2f0 [ 14.506423] srremove+0x28/0x70 [ 14.506427] devicereleasedriverinternal+0xef/0x1c0 [ 14.506428] devicereleasedriver+0x12/0x20 [ 14.506429] busremovedevice+0xe1/0x150 [ 14.506431] devicedel+0x167/0x380 [ 14.506432] __scsiremovedevice+0x11d/0x150 [ 14.506433] scsiremovedevice+0x26/0x40 [ 14.506434] storvscremovelun+0x40/0x60 [ 14.506436] processonework+0x209/0x400 [ 14.506437] workerthread+0x34/0x400 [ 14.506439] kthread+0x121/0x140 [ 14.506440] ? processonework+0x400/0x400 [ 14.506441] ? kthreadpark+0x90/0x90 [ 14.506443] retfromfork+0x35/0x40 [ 14.506445] ---[ end trace 2d9633159fdc6ee7 ]---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49986.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
436ad941335386c5fc7faa915a8fbdfe8c908084
Fixed
b692c238ddfa61f00d97c4c1f021425d132ba96f
Fixed
b4c928ace9a123629eeb14ec5d7ee8f73e5ac668
Fixed
46fcb0fc884db78a0384be92cc2a51927e6581b8
Fixed
cd2a50d0a097a42b6de283377da98ff757505120
Fixed
828f57ac75eaccd6607ee4d1468d34e983e32c68
Fixed
d957e7ffb2c72410bcc1a514153a46719255a5da

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49986.json"